Since intercepting https is considered man in the middle attack and even 
illegal in some jurisdictions, not the US I hope, I am leery of proxying all 
the time and I want to take a hybrid approach.

Can I write a helper module for iptables that will allow me to evaluate the URL 
an https connection is targeting? I can maintain a whitelist of sites that are 
legitimate all the time and a blacklist of sites that are never legitimate, the 
goal being to not put a proxy in the middle unless the nature of the https site 
is unknown.

I'm also having problems getting TPROXY in the mangle table to work correctly 
where the standard invocation won't support a nuanced approach. I only want to 
proxy for sites that are neither on the whitelist nor the blacklist. For sites 
on the blacklist, redirect to a local web server is best telling you the URL is 
blacklisted. Actually, e2guardian should take care of that if you are going 
through it...

Is there a way to filter https with e2guardian and squid that is actually legal 
everywhere? The whole peek and splice approach is highly technical where you 
end up with a weird certificate in the connection which firefox complains 
about. Even if you say accept the risk, you rarely get to the site.

Living in the midwest, it would be nice if an ISP existed that filters for you. 
Neither opendns nor squid plus e2guardian alone is enough. Configuring 
e2guardian is a bit confusing sadly :-( The whole point of e2guardian is 
processing meta tags for filtering purposes.

I find it sad that 90% of porn is probably using the https protocol. Even 
pornhub apparently is advertising that they are going to use TOR now to ensure 
that people have "private" access. Forgot about the actors in porn that later 
decide they made a huge mistake and they are plastered all over the Internet.

Linux does not have Covenant Eyes where I prefer to work in Linux over Windows 
or MacOS. Linux is cheaper, it's more powerful, and it works. I'm trying to 
build a low cost server that has the sole purpose of filtering. As such, a 
500GB WD black hard drive and AMD Athlon II processor... I have 16-32 gigs of 
ram, but that is the most expensive part. In a small tower case I used a USB 
thumb drive to install debian Jessie. I probably should upgrade to Buster...

So I'm thinking the hybrid approach has three cases:

Case 1:
Unknown https site that must be accessed through a filtered proxy.

Case 2:
Known bad site that shouldn't be accessed at all and user should be told this 
is the case, redirect with no proxying.

Case 3:
Known good site that must be allowed direct without a proxy in the middle 
(think credit union, etcetera.)

I want the proxying to be transparent, but I have yet to get that working where 
the standard approach is wrong. Sometimes there should be no interception when 
the attempt is to a known good site or a local resource. Management of the 
blacklist should be through a local web site on the filtering server.

I'm using opendns, don't know Spectrum's DNS servers. If only I could pre 
populate a local blacklist with site names that opendns blacklists.

Am I correct in thinking that I want to evaluate packets in the PREROUTING 
chain of the mangle table for whether or not they are https packets to a known 
bad site, a known good site, or an unknown site?
_______________________________________________
PLUG mailing list
PLUG@pdxlinux.org
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to